S.No. |
Title |
Author |
Pages |
Download |
Google Scholar |
1 |
Cryptography Techniques for Image Security and Authentication using Cellular Automata Algorithms
|
M.Venugopal, E.G. Rajan, Venkat Raman |
1-6 |
11713 |
View |
2 |
Improved Performance for “Color to Gray and Back” using DCT-Haar, DST-Haar, Walsh-Haar, Hartley-Haar, Slant-Haar, Kekre-Haar Hybrid Wavelet Transforms
|
H. B. Kekre, Sudeep D. Thepade, Ratnesh N. Chaturvedi |
7-12 |
12246 |
View |
3 |
Combined Economic and Emission Dispatch Using Multiobjective Particle Swarm Optimization with SVC Installation
|
Sravanthi Velaga, K.Padma |
13-18 |
11132 |
View |
4 |
To Develop Prototype Model of FPGA and RF UP Converter
|
Neeta S. Matti, Saroja V. Siddamal |
19-24 |
11909 |
View |
5 |
Data Mining with Meteorological Data
|
A. R. Chaudhari, D. P. Rana, R. G. Mehta |
25-29 |
12210 |
View |
6 |
Optimal Coordination of Directional Overcurrent Relays using Interval Two Phase Simplex Linear Programming
|
Shimpy Ralhan, Shashwati Ray |
30-35 |
10816 |
View |
7 |
Segmentation of Similar Color Objects using Modified GrowCut Method
|
Sayan Bhowal, Bibhas Chandra Dhara |
36-41 |
10562 |
View |
8 |
Image Steganography using DCT-DST, Haar-DST, Walsh-DST, Hartley-DST Hybrid Wavelet Transforms
|
H. B. Kekre, Sudeep D. Thepade, Ratnesh N. Chaturvedi |
42-46 |
11789 |
View |
9 |
Multicast Routing in Scalable Networks using MAODV
|
Jayalakshmi G Naragund, R M Banakar |
47-53 |
10776 |
View |
10 |
Detection of facial features of frontal face color images
|
Nidhi Tiwari, Mohd.Ahmed |
54-58 |
11129 |
View |
11 |
Multi-Document Text Summarization using Mutual Reinforcement and Relevance Propagation Models Added with Query and Features Profile
|
Poonam P. Bari , Shanta Sondur |
59-63 |
11104 |
View |
12 |
Measuring Coverage Percentage for C Programs using Code Slicer and CREST Tool
|
Sangharatna Godboley, Avijit Das, Kuleshwar Sahu3 , Durga Prasad Mohapatra, Banshidhar Majhi |
64-69 |
10796 |
View |
13 |
Power Flow in PMSG Connected Wind Energy Conversion System through Current Source Converter Using Space Vector Modulation Technique
|
B.D. Srinivasa Rao, Ch. Hemanth Kumar, V. Srikanth Babu |
70-75 |
11045 |
View |
14 |
Feature based Opinion mining - towards Performance Measure
|
Ravikiran Kalava, G.Anil Kumar, Ch.Vasavi |
76-79 |
11036 |
View |
15 |
A Comparative Study of Amazon Web Service and Windows Azure
|
Rajeev BV, Vinod Baliga, Arun kumar |
80-87 |
11412 |
View |
16 |
Association Rule Mining Analyzation Using Column Oriented Database
|
D. P. Rana, N. J. Mistry, M. M. Raghuwanshi |
88-93 |
10558 |
View |
17 |
Comparative Analysis of Clustering Techniques for Real Dataset
|
Kishor T. Mane, Vandana G. Pujari |
94-97 |
11898 |
View |
18 |
Complexity analysis of MIMO sphere decoder using radius choice and increasing radius algorithms
|
Suneeta V. Budihal, Rajeshwari M. Banakar |
98-105 |
11188 |
View |
19 |
Development of Wireless Monitoring System for Neonatal Intensive Care Unit
|
N.S. Joshi, R.K. Kamat , P.K. Gaikwad |
106-109 |
10634 |
View |
20 |
Controller Design for Supercapacitor as Energy Storage in Medium Voltage AC System
|
Pankaj Govind Hiray, B. E. Kushare |
110-114 |
11359 |
View |
21 |
A Complete Analysis and Dynamic Simulations of Superconducting Quantum Interference Device (SQUID) Logic gates
|
Kurapati Srinivas |
115-120 |
11024 |
View |
22 |
Design of Structured Regular LDPC Codes without Short Cycles using Gray Code Representations
|
Vibha Kulkarni, K. Jaya Sankar |
121-126 |
10877 |
View |
23 |
Reconfiguration Challenges & Design Techniques in Software Defined Radio
|
M. S. Karpe, A. M. Lalge, S. U. Bhandari |
127-132 |
11012 |
View |
24 |
Software Defined Radio Principles and Platforms
|
A.M.Lalge , M.S.Karpe , S.U.Bhandari |
133-138 |
11440 |
View |
25 |
E-Governance services using Cloud Computing Services
|
A.Rakesh Phanindra, V. B. Narasimha, M. L. Saikumar |
139-144 |
10730 |
View |
26 |
Watchdog Technology to impose Information Authentication in Mobile Cloud over SaaS & PaaS Layers
|
Vineet Guha, Rajeev Kumar Shrivastava, Manish Shrivastava |
145-150 |
10308 |
View |
27 |
Multitenant Software as a Service: Application Development Approach
|
Suhas Gajakosh, Mukta Takalikar |
151-155 |
13432 |
View |
28 |
Object recognition with ORB and its Implementation on FPGA
|
A.V.Kulkarni, J.S.Jagtap, V.K.Harpale |
156-162 |
10398 |
View |
29 |
A Variable Length Distributed Source Coding Algorithm for WSNs
|
K S Shivaprakasha, Muralidhar Kulkarni |
163-168 |
10519 |
View |
30 |
Multi Way Feedback Encryption Standard (MWFES): Ver-I
|
Purnendu Mukherjee, Prabal Banerjee, Asoke Nath |
169-175 |
10191 |
View |
31 |
Defect Detection Efficiency: A Combined approach
|
Rashmi N, Suma V |
176-181 |
10646 |
View |
32 |
Emotion Recognition with Speech for Call Centres using LPC and Spectral Analysis
|
Rashmirekha Ram, Hemanta Kumar Palo, Mihir Narayan Mohanty |
182-187 |
9870 |
View |
33 |
Improving Tiled Bitmap Algorithm for Detection and Analysis of Tampered Database
|
G. N. Dhanokar, S. P. Patil |
188-193 |
10838 |
View |
34 |
Implementation of RC4 Stream Cipher Using FPGA
|
S. C. Wagaj, Chetan Bagul, Ramkrushna Chaudhari |
194-197 |
10527 |
View |
35 |
Task Cost Based Approach for Grid Service Reliability Modeling on Fault Recovery
|
Nana Kacharu Zalte |
198-203 |
11037 |
View |
36 |
An Application of Fuzzy Logic for Expert Selection
|
Prajakta C. Dhote, Pradeep K. Butey |
204-208 |
11413 |
View |
37 |
Modern Encryption Standard version IV: (MES-IV)
|
Asoke Nath, Payel Pal |
209-216 |
11411 |
View |
38 |
Face Recognition using Depth Map Generation for Smart phones
|
Anshu Sisodhiya, Ankita Jain, R M Banakar |
217-222 |
11255 |
View |
39 |
Executable UML plug-in for Eclipse
|
A. M. Magar, N. J. Uke |
223-226 |
11609 |
View |
40 |
A review of Opportunistic Routing for Wireless Ad-hoc Networks
|
Nusrat Anjum, Sanjay Thakur |
227-231 |
10374 |
View |
41 |
Interactive 3D Remote Visualization of Medical Volume Data in Distributed Environment
|
Alok Pratap Singh, Piyush Kumar, Anupam Agrawal |
232-238 |
9832 |
View |
42 |
Media Access Protocol in Vehicular Ad-Hoc Networks: A Survey
|
Deepma Jain, Gaurav Shrivastava |
239-243 |
10639 |
View |
43 |
Stability of n- Homomorphisms, n- Derivations of A n-Dimensional Additive Functional Equation in C*- Ternary Algebras
|
M. Arunkumar, T. Namachivayam |
244-249 |
9791 |
View |
44 |
Modern Encryption Standard version V: (MES-V)
|
Asoke Nath, Bidhusundar Samanta |
250-257 |
10640 |
View |
45 |
Field Programmable Gate Array based Simultaneous Temperature-Visualization on Video Graphics Array Monitor for Multi-Sensor Data Acquisition System
|
P.K. Gaikwad |
258-263 |
10316 |
View |
46 |
Perturbation of n-Dimensional Quadratic Functional Equation: A Fixed Point Approach
|
S. Murthy, M. Arunkumar and G. Ganapathy |
264-269 |
9439 |
View |
47 |
The improves energetic yield of high temperature fuel cell (MCFC) using advance techniques in modeling and optimization analysis
|
S. K. Dhakad, S.C.Soni, Pankaj Agarwal |
270-272 |
9643 |
View |
48 |
Result Analysis of Image Denoising Method based on Fourth-Order Partial Differential Equations
|
Anand Swaroop Khare, Ravi Mohan, Sumit Sharma |
273-277 |
9288 |
View |
49 |
Diabetic Retinopathy using Image Processing Detection, Classification and Analysis
|
Snehal P. Savarkar , Namrata Kalkar , S.L.Tade |
278-281 |
9298 |
View |
50 |
Concrete Structure Analysis and Classification using Image Processing
|
Rashmi R.A, A.D Mane, S.L Tade |
282-287 |
5416 |
View |
51 |
Green Computing and Green Technology based teaching learning and administration in Higher Education Institutions
|
Shalabh Agarwal, KaustuviBasu , Asoke Nath |
288-296 |
5553 |
View |
52 |
3-D Drawing Digital Pen
|
V. S. Kayastha, V. N. Supe, S. U. Bhandari |
297-301 |
5595 |
View |
53 |
New Median Based Adaptive and Robust Digital Image Secured System
|
Shivani Maheshwari, Pushpendra Singh Tomar, Manish Shrivastava |
302-307 |
6037 |
View |
54 |
Importance of Network Security in Internet of Things
|
Bhagyashri H. Katole, Suresh V. |
308-312 |
5113 |
View |
55 |
Error Code Correction Using Reed Solomon Codes: A Review
|
Anshul Sarawagi, Manish Shrivastava |
313-317 |
4886 |
View |
56 |
Minimal Routing Cooperation using Route Weight for MANET
|
Neha Tripathi, Vivek Kumar, K.S. Raghuwanshi |
318-324 |
4845 |
View |
57 |
Simulation of Airbag Impact on the Eye Using Finite Element Analysis
|
Ravi Varma N., Darshana M. Jibhakate, Ankita Pravin Khawas |
325-329 |
5493 |
View |
58 |
Best Path Finding using Location aware AODV for MANET
|
Anagha Raich, Amarsinh Vidhate |
330-334 |
5565 |
View |
59 |
Review on High Performance Energy Efficient Multicore Embedded Computing
|
Archana S. Shinde, Swapnali B. Bhosale, Ashok R. Suryawanshi |
335-341 |
4912 |
View |
60 |
Regression Analysis and Statistical Approach on Socio-Economic Data
|
Syeda Farha Shazmeen, Mirza Mustafa Ali Baig, M. Reena Pawar |
342-346 |
5879 |
View |
61 |
Identification & Detection System for Animals from their Vocalization
|
A. D. Mane, Rashmi R. A., S. L. Tade |
347-352 |
4552 |
View |
62 |
Secured Cloud Data with IA
|
Prasad N H, Lakshmi Narayan B N, Pradeep Kumar S |
353-356 |
5682 |
View |
63 |
E-Mine: A Web Mining Technique for Relevant Data Regions
|
Vaishnavi J. Deshmukh, Anuja K. Pande, Sapna.Kaushik, Pallavi B. Rathod, Payal.Pawade |
357-362 |
5178 |
View |
64 |
Thermoelectric Power Generation as an Alternative Green Technology of Energy Harvesting
|
Ravi R.Nimbalkar, Sanket S. Kshirsagar |
363-368 |
5052 |
View |
65 |
Comparative Analysis of Multipath Routing Techniques and Design of Secure Energy Aware Routing Algorithm for Wireless Sensor Network
|
Simran R. Khiani,C. G. Dethe,V. M. Thakare |
369-375 |
4705 |
View |
66 |
Speaker Verification Using I-Vectors
|
N.S.Kalkar, S.P.Savarkar, RajaniP.K |
376-384 |
4754 |
View |
67 |
Survey on Security aspect of WSN
|
Gaurish Edake, Ganesh Pathak |
385-389 |
4870 |
View |
68 |
A3 (Authenticate Auditor & Avail) for Preserving Integrity of Data in Cloud Computing
|
Sagar Shivaji Sawant, Suhit Sukhadeo Kalubarme |
390-395 |
5145 |
View |
69 |
Comparative Study on Image Segmentation Algorithms
|
G. Evelin Suji , Y.V.S. Lakshmi , G. Wiselin Jiji |
396-401 |
6025 |
View |
70 |
Hybrid Meta-heuristic Pattern Classification
|
Rashmi G. Dukhi, Pratibha Mishra |
402-406 |
5946 |
View |
71 |
Result Analysis of Bit-Error Rate (BER) of the MC DS-CDMA System
|
Rishi Choubey, Ravi Mohan, Sumit Sharma |
407-411 |
5266 |
View |
72 |
Implementation of wavelet family on biomedical images compression
|
Monika shukla, Sonika arrora, Mangal singh |
412-417 |
4646 |
View |
73 |
Result discussion with in MIMO-OFDM Systems with Multiple Antennas
|
Jitendra Kumar Daksh, Ravi Mohan, Sumit Sharma |
418-422 |
5938 |
View |
74 |
Design of Fuzzy Inference System for Contrast Enhancement of Color Images
|
Nutan Y. Suple , Sudhir M. Kharad |
423-427 |
5812 |
View |
75 |
Implementation of Fast Deblurring Process on Segments of Image by Blind Deconvolution Algorithm
|
Neetin Kumar, Manish Shrivastava |
428-431 |
4672 |
View |
76 |
An Assessment of the Impact of Dimensionality Reduction on the Speed and Accuracy of Hyperspectral Image Classification
|
Abhineet Singh, Savita Verma, Mangal Raj, Anupam Agrawal |
432-437 |
5482 |
View |
77 |
Optimization of Variable Speed Wind Turbine Using Pi Controller
|
J.S.Sathiyanarayanan, A. Senthil kumar |
438-442 |
5734 |
View |